Bug 1678254 (CVE-2019-8396)

Summary: CVE-2019-8396 hdf5: buffer overflow in function H5O__layout_encode in H5Olayout.c
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: anto.trande, c.david86, dakingun, hbrock, igor.raits, jjoyce, jschluet, jslagle, lhh, lpeer, mburns, orion, sclewis, slinaber
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-27 03:24:55 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1678255, 1679083, 1679084, 1679085, 1679086, 1679087, 1679088    
Bug Blocks: 1678263    

Description Dhananjay Arunesh 2019-02-18 11:25:28 UTC
A buffer overflow in H5O__layout_encode in H5Olayout.c in the HDF HDF5 through 1.10.4 library allows attackers to cause a denial of service via a crafted HDF5 file. This issue was triggered while repacking an HDF5 file, aka "Invalid write of size 2."

Reference:
https://github.com/magicSwordsMan/PAAFS/tree/master/vul4

Comment 1 Dhananjay Arunesh 2019-02-18 11:25:41 UTC
Created hdf5 tracking bugs for this issue:

Affects: fedora-all [bug 1678255]